Muutke küpsiste eelistusi

Digital Defense: A Cybersecurity Primer 1st ed. 2015 [Kõva köide]

  • Formaat: Hardback, 209 pages, kõrgus x laius: 235x155 mm, kaal: 3999 g, 36 Illustrations, color; 6 Illustrations, black and white; XX, 209 p. 42 illus., 36 illus. in color., 1 Hardback
  • Ilmumisaeg: 03-Nov-2015
  • Kirjastus: Copernicus
  • ISBN-10: 3319199528
  • ISBN-13: 9783319199528
  • Kõva köide
  • Hind: 25,53 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 30,04 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Hardback, 209 pages, kõrgus x laius: 235x155 mm, kaal: 3999 g, 36 Illustrations, color; 6 Illustrations, black and white; XX, 209 p. 42 illus., 36 illus. in color., 1 Hardback
  • Ilmumisaeg: 03-Nov-2015
  • Kirjastus: Copernicus
  • ISBN-10: 3319199528
  • ISBN-13: 9783319199528
Drs. Pelton and Singh warn of the increasing risks of cybercrime and lay out a series of commonsense precautions to guard against individual security breaches. This guide clearly explains the technology at issue, the points of weakness and the best ways to proactively monitor and maintain the integrity of individual networks. Covering both the most common personal attacks of identity fraud, phishing, malware and breach of access as well as the larger threats against companies and governmental systems, the authors explain the vulnerabilities of the internet age. As more and more of life's transactions take place online, the average computer user and society at large have a lot to lose. All users can take steps to secure their information. Cybercrime is so subtle and hidden, people can ignore the threat until it is too late. Yet today about every three seconds a person is hit by some form of cyber attack out of the blue. Locking the “cyber-barn door” after a hacker has struck is way too late. Cyber security, cyber crime and cyber terrorism may seem to be intellectual crimes that don't really touch the average person, but the threat is real. Demystifying them is the most important step and this accessible explanation covers all the bases.

Arvustused

Digital defense is a well-written, easy-to-follow, practical book, suitable for personal as well as professional use. the authors also provide the necessary data to help us make better decisions regarding selecting vacation destinations and hotels or products by reading the reviews of other customers. Overall, this is a useful handbook for daily digital life. (Sandhya Jane, Computing Reviews, January, 2017)

The goal of this helpful resource is to explain the importance of cybersecurity to anyone using a computer or mobile device. The most valuable aspect is the authors holistic approach. They present concepts in easily understood language, define potential threats, and describe concrete steps to defend against and reduce exposures. Summing Up: Highly recommended. Lower-division undergraduates, two-year technical program students, and general readers. (M. B. DuBois, Choice, Vol. 53 (10), June, 2016)

Written for a general audience, with end-of-chapter references for the more technically and detail minded, readers will be pleased to place this excellent presentation on their bookshelves. This excellent presentation is readable by novices. It is so well rounded that even a seasoned professional will be reminded of issues to address. Readers will enjoy and learn from this book. (Brad Reid, Computing Reviews, December, 2015)

1 What Is at Stake? What Should You Do? Why Should You Care?
1(24)
Houston, Texas, and the "Hacked Baby Cam" in the Nursery
1(1)
The Sum of 22,000 lb Transferred from Elderly Mother's Bank Account in London, England
2(1)
Couple Sentenced for False Tax Refund Conspiracy
3(1)
Teens and Cyber Identity Theft
3(1)
Kaitlin Jackson's Campaign Against Cyberbullying Trolls
4(1)
Hacking into Aircraft Communications and IT Wireless Communications Networks
5(1)
Level One Attacks
6(1)
Level Two Attacks
7(1)
Level Three Attacks
7(1)
Level One Threats to Be Taken Seriously
8(8)
Handle with Care!
8(1)
CryptoWall 2.0
9(1)
The Trade in Swipeable Credit Card Information
9(2)
The Cyber Criminal Bazaar
11(3)
Cyber Thieves and Medical Records
14(1)
Nigerian Prince Come-Ons and the Latest in Targeted Online Scams
14(1)
Protecting Against Personal Cyber Attacks
15(1)
Phishing and Pharming
15(1)
Level Two Cyber-Attacks
16(1)
Trojans on the Attack Against Banks
16(1)
Insurance Collapse Due to Massive Cyber Attacks
17(1)
The "Internet of Things": A World in Which Cars, Appliances, and Almost Everything Is Connected to the Net
18(1)
Level Three Attacks
19(2)
GPS Resilience and Vulnerability
19(1)
Attack on Water and Sewage Systems via SCADA Systems
20(1)
Transit Systems and Aircraft Safety at Risk
21(1)
A Recap of Why You Should Care
21(2)
References
23(2)
2 Where to Go for Assistance
25(24)
Help Available
25(2)
Electronic Filters That Protect Against Malware Intrusions
27(3)
Recommended Websites
29(1)
Identity Theft Protection
30(4)
Firewalls and Backup Memory
34(3)
Common Features That Personal Firewall Can Offer
35(1)
Limitations of Firewalls
35(2)
Insurance Offerings
37(1)
What to Do
38(1)
And Now How to Protect Your Family Against Cyberbullies, Pornography, Online Hate Messages, and Other Cyber-Related Maladies
39(2)
What to Do About Protecting Your Family's Computers from Cyber Criminals, Stalkers and Bullies
41(3)
What to Do About Pornographic Sites and Sexting
44(1)
Protective Strategies for the Over-50 Crowd
44(2)
Conclusions
46(1)
References
47(2)
3 Is Anyone Looking Out for You? Your Government? Businesses Where You Trade? Your Neighbor? or Just Yourself?
49(18)
Governmental Issues: The "Snowden Factor"
52(6)
Corporate and Industrial Issues
58(2)
Individual Transgressions and Cyber-World Concerns
60(2)
Conclusions
62(3)
References
65(2)
4 Ten Key Things to Protect
67(16)
Introduction
67(1)
The Top Ten Things for You and Your Family to Protect Against and How
68(11)
#1 Protect Stocks, Bonds, and Retirement Accounts
69(2)
#2 Protect Your Bank Account and Credit Card Account Records
71(1)
#3 Protect Your Social Security, Medicare/Medicaid Accounts and Medical Records
72(1)
#4 Protect Desktop Computers, Wi-Fi, and Computer Routing Systems (LANS and WANS)
73(1)
#5 Protect Personal Cell Phones/Smart Phones
74(1)
#6 Upgrade Cyber Security Systems for Vital Infrastructure
75(1)
#7 Protect Big Data and Social Media: And At Least Some of Your Privacy
76(1)
#8 Don't Put All of Your Eggs in One Basket
77(1)
#9 Protect Yourself by Doing Audits
78(1)
#10 Protect Your Personal Things, Your Family, and Your Business Interests, Including Your Last Will and Testament, Plus Donations and Legacy
78(1)
Conclusions
79(1)
References
80(3)
5 Cybersecurity for Smart Phones, Mobile Apps, and "The Cloud"
83(20)
Introduction
83(2)
The Dangers of Wi-Fi Access to the Internet
85(1)
Mobile Applications on Smart Phones
86(1)
Mobile Phone Security and Access
87(1)
Making Your Smart Phone More Secure
88(1)
Cybersecurity and Banking Apps
89(3)
The Cloud
92(8)
Evaluating Personal Cloud Services (Fig. 5.3)
92(8)
Conclusions
100(1)
References
100(3)
6 Protecting Vital Cyber Infrastructure
103(24)
Introduction
103(2)
SCADA Networks in Our Lives that We Never See
105(3)
SCADA Systems Security in a Community
107(1)
Satellite Networks and Cyber Risks
108(9)
Satellites and Cybersecurity
109(1)
Satellite Technology and Systems
110(2)
Application Satellites with Cybersecurity Implications
112(5)
Fixed Satellite Systems and High Throughput Satellites
117(1)
Mobile Satellite Systems
118(5)
Conventional Mobile Satellite Communications
119(2)
Mobile Satellite Systems with ATC Ancillary Terrestrial Component
121(2)
Conclusions
123(1)
References
124(3)
7 Who Will Control the Future, Black Hat Hackers or the Hacked?
127(18)
The Viral Cyber World
127(1)
How Do We Protect Ourselves from Cyber-Attacks Going Forward?
128(3)
Coping with Current and Future Cyber Threats
131(1)
Nearer Term Threats: Computer Fraud, Wi-Fi, Wireless LANs, and the Cloud
132(1)
Wireless Local Area Networks (LANs) and Satellite Networking
133(2)
Security Flaws in The Cloud
134(1)
Best Practices for Companies in the Cloud
134(1)
Cyber Protection of Vital Infrastructure Under U.S. Government and Corporate Management
135(3)
The Smart Grid
138(1)
Vulnerable Apps on Smart Phones and Desktop Computers
138(2)
The Internet of Things
140(1)
Hololens and Cybersecurity
141(1)
Conclusions
142(1)
Post-conclusions: Cyber Opportunities vs. Cyber Threats to Our Lives?
143(1)
References
144(1)
8 Ten Essential Rules for Your Cyber Defense
145(12)
#1 Protect Your Personal Records and Your Passwords
145(2)
#2 Obtain a Secure Place to Store Vital Information
147(1)
#3 Shred All Financial, Medical, and Other Personal Information that You Discard
147(1)
#4 Get AntiVirus Software Protection
148(1)
#5 Prevent Your Identity from Being Stolen
149(2)
#6 Obtain at Least the Basic Personal Firewall Protection
151(1)
#7 Recognize Warning Signs and Respond Quickly to Threats
151(1)
#8 Consider Getting Comprehensive Insurance Against Financial and Cyber-Loss
152(1)
#9 Support the Adoption of Stricter Governmental Legislation and Standards for Cybersecurity
153(1)
#10 Take Common Sense Steps to Guard Against Cyber-Attacks
154(1)
References
155(2)
Appendix A Glossary of Definitions and Acronyms 157(18)
Appendix B Current U. S. Priorities on Cybersecurity 175(4)
Appendix C The U.S. Comprehensive National Cybersecurity Initiative (CNCI) 179(10)
Appendix D Cybersecurity Activities and Policies Around the World 189(12)
About the Authors 201(6)
Index 207
Indu B. Singh, Ph.D., is currently Vice President of Los Alamos Technical Associates (LATA) and head of its Washington, D.C. Operations. His responsibilities include expanding LATAs presence in the Security and Public Safety sectors, both domestically and internationally. He also serves as Executive Director of LATAs Global Institute for Security Training (GIST). Indu served as Director for Systems Engineering and WMD for Deloitte USA. Previously, he served as a Managing Partner at Bearing Point, a publicly traded company, prior to its acquisition by Deloitte Consulting.

Dr. Singh is considered a pioneer in the designing and implementing Smart Cities and Safe Cities around the world as well as Urban Security. In 2009 he joined with Dr. Pelton in writing Future Cities as a project for the Intelligent Community Forum headquartered in New York City. In 2014 he again teamed with Dr. Pelton to write The Safe City: Living Free in a Dangerous World. Dr. Singh has published severalbooks on communications, IT systems and security and is a former faculty member of Rutgers University. He is also a former Strategic Director for James Martin and Associates, a global information engineering corporation. Dr. Singh is a recognized expert on solution engineering, health IT, cyber security and public safety.

Joseph N. Pelton, Ph.D., is the principal of Pelton Consulting International. He is the former Dean and Chairman of the Board of Trustees of the International Space University and Director Emeritus of the Space and Advanced Communications Research Institute (SACRI) at George Washington University. Dr. Pelton was the Director of the Interdisciplinary Telecommunications Program at the University of Colorado from 1988 to 1997, and at the time it was the largest such graduate program in the U.S. He previously held various executive positions at Intelsat and Comsat, including serving as Director of Project SHARE and Director of Strategic Policy for Intelsat. Intelsats Project SHARE gave birth to the Chinese National TV University. Dr. Pelton was the founder of the Arthur C. Clarke Foundation and remains as the Vice Chairman on its Board of Directors. He was also the founding President of the Society of Satellite Professionals (SSPI) and has been recognized in the SSPI Hall of Fame. He has served as President of the Arlington County Civic Federation, as a member of its Long Range Planning Commission that initiated smart growth in Arlington and is also Chair of the IT Advisory Commission for Arlington County. Pelton is a widely published award winning author with some 40 books written, co-authored or co-edited. His Global Talk won the Eugene Emme Literature Award and was nominated for a Pulitzer Prize. He is on the Advisory Board of the World Future Society and also frequently speaks and writes as a futurist.  Dr. Pelton is a member of the International Academy of Astronautics, an Associate Fellow of the American Institute of Aeronauticsand Astronautics (AIAA) and a Fellow of the International Association for the Advancement of Space Safety (IAASS).